28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Organization<br />

As the name suggests, JUNOS Cookbook is organized as a series of recipes. Each recipe<br />

begins with a problem statement that describes a common situation you might<br />

face. After each problem statement is a brief solution that shows a sample router<br />

configuration or script that you can use to resolve that particular problem. A<br />

discussion section then describes the solution, how it works, and when you should<br />

or should not use it.<br />

I have tried to construct the recipes so that you can turn directly to the one that<br />

addresses your specific problem and find a useful solution without needing to read<br />

the entire book. If the solution includes terms or concepts you are not familiar with,<br />

the chapter introductions should help bridge the gap. Many recipes refer to other<br />

recipes or chapters that discuss related topics. I have also included a variety of references<br />

to other sources in case you need more background information on a particular<br />

subject.<br />

The chapters are organized by the feature or protocol discussed. If you are looking<br />

for information on a particular feature such as BGP, MPLS, or SNMP, you can turn<br />

to that chapter and find a variety of related recipes. Most chapters list basic problems<br />

first and any unusual or complicated situations last. But there are some exceptions<br />

to this, such as where I have instead grouped related recipes together.<br />

What’s in This Book<br />

The first chapters cover essential system administration functions of the router:<br />

Chapter 1, Router Configuration and File Management<br />

Covers router configuration and file management issues<br />

Chapter 2, Basic Router Security and Access Control<br />

Focuses on router security, describing user access and privileges on the router<br />

and how to protect your router from undesired access<br />

Chapter 3, IPSec<br />

Describes how to use IPSec to encrypt and secure traffic<br />

The next three chapters focus on managing the router:<br />

Chapter 4, SNMP<br />

Discusses how to use the Internet standard SNMP protocol to remotely manage<br />

your router<br />

Chapter 5, Logging<br />

Explains how to log events that occur on the router so you can trace the causes<br />

of router and network malfunctions<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.<br />

Preface | xix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!